Table 11: Co-owners’ rates on data security features.
Co-owner’s id Confidentiality Integrity Availability Privacy Possession NKP
Bob 1 1 1 0 0 100
Daniel 1 1 1 1 1 0
Table 12: Trust values before sharing the data.
Alice’s Trust in Co-i Co-id Co-i s Trust in Alice p − loss T − loss final-trust-in Alice
0.6 Bob 0.7 0.68 0.47 0.23
0 Daniel 0.5 0.8 0.21 0.29
Table 13: Co-owners’ rates on data security features.
S
d
R C f
0.8 0.07 0.256
tures. Once co-owners choose which CIAPP features
are their worries, then the fuzzy logic based decision
system infers the decision. After getting the decision
from the fuzzy logic based system, our system goes
through the sharing process. If the owner choose the
co-owner trust preferential when they set their privacy
policy up on the data, then our system calculates the
privacy loss, the trust loss, and the trust gain values. If
the owner shares the data with targeted group without
considering the co-owners’ choices on the CIAPP fe-
atures, the the owner looses the value on their reputa-
tion. However, if the owner chooses the owner trust
preferential in the beginning, then they do not loss
value on their reputation, since the fuzzy decision is
based on the co-owners choices on CIAPP features.
It is clearly seen that the fuzzy logic decision based
system helps users to make trade-off sharing the data
and getting benefits out of sharing data with incre-
ment on the reputation value.
REFERENCES
Ali, S., Rauf, A., Islam, N., and Farman, H. (2017). A fra-
mework for secure and privacy protected collaborative
contents sharing using public osn. Cluster Computing.
Cherdantseva, Y. and Hilton, J. (2012). The evolution of
information security goals from the 1960s to today.
Unpublished.
Du, J., Jiang, C., Chen, K.-C., Ren, Y., and Poor, H. V.
(2018). Community-structured evolutionary game
for privacy protection in social networks. IEEE
Transactions on Information Forensics and Security,
13(3):574–589.
Hagberg, A., Swart, P., and S Chult, D. (2008). Explo-
ring network structure, dynamics, and function using
networkx. Technical report, Los Alamos National
Lab.(LANL), Los Alamos, NM (United States).
Hosseini, R., Qanadli, S. D., Barman, S., Mazinani, M., El-
lis, T., and Dehmeshki, J. (2012). An automatic appro-
ach for learning and tuning gaussian interval type-2
fuzzy membership functions applied to lung cad clas-
sification system. IEEE Transactions on Fuzzy Sys-
tems, 20(2):224–234.
Hu, H. and Ahn, G.-J. (2011). Multiparty authorization fra-
mework for data sharing in online social networks. In
Li, Y., editor, Data and Applications Security and Pri-
vacy XXV, pages 29–43, Berlin, Heidelberg. Springer
Berlin Heidelberg.
Hu, V. C., Kuhn, D. R., and Ferraiolo, D. F. (2015). At-
tribute based access control. IEEE Computer Society,
48(1):85–88.
Jamsandekar, S. S. and Mudholkar, R. R. (2014). Fuzzy
classification system by self generated membership
function using clustering technique. BVICA M’s Inter-
national Journal of Information Technology, 6(1):697.
Joseph, N. S. (2014). Collaborative data sharing in online
social network resolving privacy risk and sharing loss.
IOSR-JCE) eISSN, pages 2278–0661.
Koyuncu, M. and Yazici, A. (2005). A fuzzy knowledge-
based system for intelligent retrieval. IEEE Transacti-
ons on Fuzzy Systems, 13(3):317–330.
Mamdani, E. and Assilian, S. (1999). An experiment
in linguistic synthesis with a fuzzy logic control-
ler. International journal of human-computer studies,
51(2):135–147.
Rathore, N. C. and Tripathy, S. (2017). A trust-based colla-
borative access control model with policy aggregation
for online social networks. Social Network Analysis
and Mining, 7(1):7.
snap Facebook Data, S. (2016). Stanford large network
dataset collection. www.kaggle.com/lightcc/stanford-
snap-facebook-data.
Squicciarini, A. C., Shehab, M., and Paci, F. (2009). Col-
lective privacy management in social networks. In
Proceedings of the 18th international conference on
World wide web, pages 521–530. ACM.
Suvitha.D (2014). Mechanisms of multiparty access cont-
rol in online social network. International Journal of
Recent Development in Engineering and Technology,
2, (3).
Ulusoy, O. (2018). Collaborative privacy management in
online social networks. In Proceedings of the 17th
International Conference on Autonomous Agents and
MultiAgent Systems, pages 1788–1790. International
Foundation for Autonomous Agents and Multiagent
Systems.
Wishart, R., Corapi, D., Marinovic, S., and Sloman, M.
(2010). Collaborative privacy policy authoring in a
Fuzzy Logic Decision based Collaborative Privacy Management Framework for Online Social Networks
683